[Webinar] Join us on April 1 for 7 Key Considerations Before Sending Your AWS CloudTrail Logs into Your SIEM – Learn More >>>

Skip to content
  • Lacework
      • PLATFORM
        • CAPABILITIES
        • Multicloud Security
        • Cloud Compliance
        • Container Security
        • Cloud Workload Protection
        • Kubernetes Security
        • ENVIRONMENTS
        • AWS Cloud Security
        • Azure Cloud Security
        • Google Cloud Security
        • Kubernetes Security
      • SOLUTIONS
        • FEATURES
        • Behavioral Anomaly Detection
        • File Integrity Monitoring
        • Host Intrusion Detection
        • USE CASES
        • Cloud Security Posture–Cloudtrail
        • Threat Detection and Response
        • Runtime Threat Defense
        • Buildtime Configuration and Threat Defense
        • Compliance and Configuration
        • CIS Benchmarks
        • USER ROLES
        • Audit and Compliance
        • Engineering/DevOps
        • DevSecOps
        • Security
        • FinTech
        • HealthTech
      • PARTNERS
      • CUSTOMERS
      • RESOURCES
      • COMPANY
        • About Us
        • Press Releases
        • In the News
        • Upcoming Events
        • Awards
        • Careers
        • Lacework Labs
        • Security
      • Login
      • Support
      • Blog
      • CONTACT US
MENU
Lacework
MENUMENU
  • Login
  • Support
  • Blog
  • CONTACT US
Search
MENUMENU
  • PLATFORM
        • CAPABILITIES

          Multicloud Security

          Cloud Compliance

          Container Security

          Cloud Workload Protection

          Kubernetes Security

          Summary

        • ENVIRONMENTS

          AWS Cloud Security

          Azure Cloud Security

          Google Cloud Security

          Kubernetes Security

  • SOLUTIONS
        • FEATURES

          Behavioral Anomaly Detection

          File Integrity Monitoring

          Host Intrusion Detection

          Host Vulnerability Monitoring

        • USE CASES

          Cloud Security Posture

          Threat Detection and Response

          Runtime Threat Defense

          Buildtime Configuration and Threat Defense

          Compliance and Configuration

          CIS Benchmarks

        • USER ROLES

          Audit and Compliance

          Engineering/DevOps

          DevSecOps

          Security

          FinTech

          HealthTech

  • PARTNERS
  • CUSTOMERS
  • RESOURCES
  • COMPANY
    • About Us
    • Press Releases
    • In the News
    • Upcoming Events
    • Awards
    • Careers
    • Legal
    • Lacework Labs
    • Security
    • Contact Us

Security For The Cloud Generation

Build Fast, Run Fearlessly

2021 Buyer’s Guide to Cloud Security

Learn Where Your Organization Stands in the Cloud Security
Maturation Model.

CISO’s Playbook to Cloud Security

The cloud has emerged as the backbone of modern enterprises. Are you prepared to secure it?

Scale Containers. Detect Intrusions.

App layer observability & cloud intrusion detection faster than you can spell Kubernetes.

Cloud Security at Scale

 

Supported Platforms

Account security solutions for cloud containers & multicloud
environments via a single unified console

Ready to Chat?

We'd love to hear from you.

Lacework’s unified cloud security platform provides unprecedented visibility, automates intrusion detection, delivers one-click investigation, and simplifies cloud compliance across AWS, Azure, and GCP, providing a comprehensive view of risks across cloud workloads and containers.

Quick Links


  • Blog
  • Careers
  • Location and Contact
  • Legal

Product/Platform


  • Overview
  • AWS Security
  • Azure Security
  • GCP Security
  • Container Security
  • Workload Security

Use Cases


  • Overview
  • Host Intrusion Detection
  • Runtime Threat Defense
  • File Integrity Monitoring
  • Kubernetes Security
  • Anomaly Detection
  • Configuration Compliance
  • Account Security
  • FinTech
  • HealthTech

Contact Info


888-292-5027

Contact Us

6201 America Center Dr
Suite 200
San Jose, CA 95002

© 2021, Lacework, Inc. - Privacy Policy | Terms of Use